BootHole Vulnerability

BootHole Vulnerability Affects Millions of Windows and Linux Systems – Allows Attackers to Install...

Security researchers uncovered a new vulnerability dubbed “BootHole” present in the GRUB2 bootloader utilized by Windows and Linux systems.
Proof-of-concept Exploits Released for CVE-2020-0601, the Microsoft-NSA Crypto vulnerability

Proof-of-Concept Exploits Released for The Microsoft-NSA Crypto vulnerability – CVE-2020-0601

Less than a day after Microsoft disclosed one of the most critical Windows vulnerabilities ever, security researchers have published PoC Exploit that...
MS Office Zero-day

All Versions of MS Office Affected with Critical Zero-day Vulnerability Allows Attackers Take Full...

A Critical MS Office Zero-day Remote Code Execution Vulnerability discovered in Microsoft Office that could allow attacker to take complete control of infected Windows...
Millions of IoT Devices Infected with “Devil’s Ivy” RCE vulnerability

Millions of IoT Devices Infected with “Devil’s Ivy” Remote Code Execution Vulnerability Including Internet...

A New Vulnerability called  “Devil’s Ivy” Discovered that infected Tens of Millions of IoT Devices which leads to Remotely Execute the code in IoT's...
cPanel 2FA Bypass

cPanel 2FA Bypass Exposes Tens of Millions of Websites to Hack

Digital Defense, Inc., a leader in vulnerability and threat management solutions, announced that its Vulnerability Research Team (VRT) exposed a previously undisclosed vulnerability affecting the...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security